The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We have previously presented Intent, a medium access control scheme for WLANs based on cooperative, distributed, non-binding frame scheduling. The main idea behind Intent is “intention sharing”—a mechanism that allows a node to be aware of transmissions previously scheduled by its neighbors. We now extend this scheme to networks with hidden nodes. We give a formulation of the scheduling problem and...
Wireless Sensor Networks (WSNs) consist of multiple, distributed nodes each with limited resources. With their strict resource constraints and application-specific characteristics, WSNs contain many challenging trade-offs. This paper proposes a bio-inspired load balancing approach, based on pheromone signalling mechanisms, to solve the trade-off between service availability and energy consumption...
Actual research projects in the fields of wireless communication systems focus on distributed, heterogeneous architectures for advanced sensor-actor-networks (SNETs). Each subsystem provides specific capabilities for measuring or manipulating its environment. At the same time, a huge amount of sensor, status and control data has to be transmitted over different network interfaces and communication...
Disruption-tolerant networks (DTNs) are groups of network assets connected with a suite of communication protocol technologies designed to mitigate the effects of link delay and disruption. Application of DTN protocols to diverse groups of network resources in multiple sub-networks results in an overlay network-of-networks with autonomous data routing capability. In space environments where delay...
In this paper, we present different modeling and execution frameworks that allow us to efficiently analyze, design and verify complex systems, mainly to cope with the specific concerns of the Real-time and embedded systems (RTE) domain. First we depict a UML /MARTE based methodology for executable RTE systems modeling with a framework and its underlying model transformations required to execute UML...
ZACA-EEC (Zigbee Ant Colony Algorithm Energy Efficient Cluster) routing protocol is proposed to replace AODV in Zigbee with the aim of increasing reliability for mine equipment monitoring in this paper, which can prolong the lifetime of network remarkably. Taking hydraulic support as an example, the distribution of monitoring nodes can be simplified as chain hierarchy topology, then Free-space model...
A framework for the joint design of wireless network and controllers is proposed. Multiple control systems are considered where the sensor measurements are transmitted to the controller over the IEEE 802.15.4 protocol. The essential issues of wireless networked control systems (NCSs) are investigated to provide an abstraction of the wireless network for a co-design approach. We first present an analytical...
We present a protocol designed to solve several consecutive consensus instances in an asynchronous distributed system prone to crash failures and message omissions. The protocol follows the Paxos approach and integrates two different optimizations to reduce the latency of learning a decision value. This protocol is adaptive as it tries to obtain the best performance gain depending on the current context...
The steadily growing deployment of resilience-critical Internet services is leading to an increasing number of Multi-Homed network sites. Asymmetric Digital Subscriber Lines (ADSL) are an inexpensive way to add a secondary Internet access connection. With the development of Multi-Path Transport Layer protocols - like Multipath TCP (MPTCP) and the Stream Control Transmission Protocol (SCTP) furnished...
We propose two scheduling protocols which are applicable to two-hop relay networks based on mobile WiMAX system: the first protocol adopts a persistent scheduling (PS) scheme in both hops, called the PS-PS protocol, while the second protocol adopts the PS scheme only in the first hop and the dynamic scheduling (DS) scheme in the second hop, called the PS-DS protocol. We optimize the above two protocols...
Admission control plays an important role in providing Quality of Service (QoS) guarantees for wireless mesh networks (WMNs). Multipath routing can improve network performance in reliability and load balancing. However, when the multipath routing are adopted in 802.11-based WMNs, the transmission with bandwidth assurance is facing rigorous challenges. In this paper, a novel joint design of multipath...
Adaptive cooperation with conflict-free relay assignment in a network setting is a challenging problem. The problem becomes even more difficult when users have quality-of-service (QoS) requirements but the available spectrum resource is limited, where admission control may be required. In this paper, we jointly study relay assignment and admission control in cooperative radio networks (CRNs). A one-stage...
The ultimate success of the Wireless Mesh Network paradigm (WMN) in large scale deployments depends on the ability to test it in real world scenarios. A typical application scenario which is worth to be investigated in such a context is peer-to-peer traffic management. The creation of large scale testbeds for evaluating wireless mesh technologies and protocols, and for testing their ability to support...
The peer-to-peer networking concept has revolutionized the cost structure of Internet data dissemination by making large scale content delivery with low server cost feasible. In a peer-to-peer network, the total upload capacity increases with the number of down loaders instead of staying constant as in a client-server architecture, making it highly scalable. Despite of its importance, the problem...
FlexRay is a popular communication protocol in modern automotive systems with several computation nodes and communication units. The complex temporal behavior of such systems depends highly on the FlexRay configuration and influences the performance of running control applications. In our previous work, we presented a design framework for integrated scheduling and design of embedded control applications,...
In this paper, we study the selfish behavior in wireless sensor networks and apply a game theory method to address this problem in a CSMA/CA protocol. More specifically, we formulate the Media Access Control (MAC) layer activity in sensor networks as an optimization problem in terms of the random accessing problem. Then we propose a distributed algorithm for the system to reach the Nash Equilibrium...
The function and structure and the architecture of sensor network based on ZigBee/802.15.4 standard for forest monitoring are designed in this paper. According to the features of forest monitoring, the sensor nodes based on CC2520 and low power consumption chip MSP430F5437 and the coordinator Combing with ARM are designed which realize the energy control in physical layer. With the wireless sensor...
Delivering desired QoS to the applications is one of the most important challenges in next generation networks. Designing efficient queue management in midway nodes leads to improvement in NGN efficiency. This paper presents fair Efficient active Queue Management (EQM) mechanism for congestion avoidance and control in next generation networks. Proposed AQM mechanism uses instantaneous queue length...
Satellite communication has become important in the current global data communication due to its large coverage area. Satellite links are affected by two major concerns: long propagation delays, and relatively high error rates. Standard TCP congestion control variants were not designed to address these challenges. They generally depend on round trip times (RTTs), and hence suffer heavily if the RTTs...
Minimizing the sensing activity during the pre-attack phase while meeting the performance requirements is critical for reducing the operational costs of chemical sensor networks. In this paper, we present a formal problem formulation for this optimization problem, and propose a decentralized, dynamic sensor activation protocol for meeting this goal. We analyze the behavior of the activation protocol...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.